Internet Engineering Task Force (IETF) W. Kim
Request for Comments: 6209 J. Lee
Category: Informational J. Park
ISSN: 2070-1721 D. Kwon
NSRI
April 2011
Addition of the ARIA Cipher Suites to Transport Layer Security (TLS)
Abstract
This document specifies a set of cipher suites for the Transport
Layer Security (TLS) protocol to support the ARIA encryption
algorithm as a block cipher.
Status of This Memo
This document is not an Internet Standards Track specification; it is
published for informational purposes.
This document is a product of the Internet Engineering Task Force
(IETF). It represents the consensus of the IETF community. It has
received public review and has been approved for publication by the
Internet Engineering Steering Group (IESG). Not all documents
approved by the IESG are a candidate for any level of Internet
Standard; see Section 2 of RFC 5741.
Information about the current status of this document, any errata,
and how to provide feedback on it may be obtained at
http://www.rfc-editor.org/info/rfc6209.
Copyright Notice
Copyright (c) 2011 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Kim, et al. Informational [Page 1]

RFC 6209 ARIA Cipher Suites for TLS April 20113. Cipher Suite Definitions3.1. Key Exchange
The RSA, DHE_RSA, DH_RSA, DHE_DSS, DH_DSS, DH_anon, ECDH, and ECDHE
key exchanges are performed as defined in [RFC5246].
3.2. Cipher
The ARIA_128_CBC cipher suites use ARIA [RFC5794] in CBC mode with a
128-bit key and 128-bit Initialization Vector (IV); the ARIA_256_CBC
cipher suites use a 256-bit key and 128-bit IV.
AES-authenticated encryption with additional data algorithms,
AEAD_AES_128_GCM, and AEAD_AES_256_GCM are described in [RFC5116].
AES GCM cipher suites for TLS are described in [RFC5288]. AES and
ARIA share common characteristics, including key sizes and block
length. ARIA_128_GCM and ARIA_256_GCM are defined according to those
characteristics of AES.
3.3. PRFs
The pseudorandom functions (PRFs) SHALL be as follows:
a. For cipher suites ending with _SHA256, the PRF is the TLS PRF
[RFC5246] using SHA-256 as the hash function.
b. For cipher suites ending with _SHA384, the PRF is the TLS PRF
[RFC5246] using SHA-384 as the hash function.
3.4. PSK Cipher Suites
Pre-shared key cipher suites for TLS are described in [RFC4279],
[RFC4785], [RFC5487], and [RFC5489].
4. Security Considerations
At the time of writing this document, no security problems have been
found on ARIA (see [YWL]).
The security considerations in the following RFCs apply to this
document as well: [RFC4279] [RFC4785] [RFC5116] [RFC5288] [RFC5289]
[RFC5487] and [GCM].
Kim, et al. Informational [Page 5]